

Full Issue
View or download the full issue |
FULL PDF
![]() |
Table of Contents
Articles
Using Interval Constrained Petri Nets and timed automata for diagnosis of dynamic systems |
PDF
![]() |
Dhouibi Hedi, Lobna Belgacem, L. Mhamdi, Zineb Simeu-Abazi | 735-743 |
An Efficient Real Time Moving Object Detection Scheme Using Diamond Search Algorithm and Mathematical Morphology |
PDF
![]() |
Djoudi Kerfa, M. F. Belbachir | 744-749 |
Multi Biometric Fuzzy Vault Generation Using Chaff Points and Cuckoo Search Optimization |
PDF
![]() |
K. Annapurani, Deepika Ravikumar, M. A. K. Sadiq | 750-756 |
Bayesian Network Model for Oath Statement Retrieval: A Case Study in Quranic Text Using Machine Learning Techniques |
PDF
![]() |
Ahmad Alqurneh, Aida Mustapha | 757-763 |
A Conceptual Foundation for Aspect-Oriented Modeling |
PDF
![]() |
Sabah Al-Fedaghi | 764-774 |
An Improved and Efficient Strong Remote User Authentication using Hash function and Smart card |
PDF
![]() |
Ramesh Sengodan, V. Murali Bhaskaran | 775-783 |
Image Noise Removal Using Rao-Blackwellized Particle Filter with Maximum Likelihood Estimation |
PDF
![]() |
Bobby Lukose, Anna Saro Vijendran | 784-792 |
An Efficient Salient Feature based Histology Image Retrieval |
PDF
![]() |
V. Vellingiri, M. Thirumarimurugan, T. Kannadasan | 793-802 |
Securing Data at Rest by Format Preserving Encryption Using Pass Phrase |
PDF
![]() |
S. Vidhya, K. Chitra | 803-808 |
An Efficient and Dynamic Data Placement, Data Mining and Knowledge Discovery Using Surrogate Object in Mobile Cloud Paradigm |
PDF
![]() |
S. Ravimaran, A. N. Gnana Jeevan, M. A. Maluk Mohamed | 809-824 |
An Efficient User Revocation and Encryption Methods for Secure Multi-Owner Data Sharing to Dynamic Groups in the Cloud |
PDF
![]() |
Gokul Geetha Narayanan, S. Raja Ranganathan, S. Karthik | 825-831 |
A Review on Structural Software-Based Self- Testing of Embedded Processors |
PDF
![]() |
Ateeq-Ur-Rehman Shaheen, Fawnizu Azmadi Hussin, Nor Hisham Hamid, Noohul Basher Zain Ali | 832-846 |
Swarm and Fuzzy Based Co-operative Cache Management Framework for MANET |
PDF
![]() |
A. Sureshkumar, R. Samson Ravindran | 847-853 |
Detection and Localization of Attackers in Wireless Networks |
PDF
![]() |
D. Sivakumar, B. Sivakumar | 854-864 |
Enhancement of Indoor Localization by Path-Loss Reduction Using Modified RSSI Technique |
PDF
![]() |
K. Vadivukkarasi, R. Kumar | 865-871 |
AAEM: Accessibility Assistance Evaluation Metric |
PDF
![]() |
B. Gohin, Viji Vinod | 872-882 |
Built-in Stigmergy-Based Load Balancing Model for HPC Clusters |
PDF
![]() |
Ahmed Adnane, H. Medromi | 883-891 |
XML Document Classification by Frequent Itemset Mining on Menonym Tree |
PDF
![]() |
D. Sasikala, K. Premalatha | 892-899 |
Erratum
Highly Robust Digital Image Watermarking Using Steerable Pyramid and Dual Encryption Technique (in: Vol. 9, n. 2, 2014) |
![]() |
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadija Jamali, Samir Mbarki, Mohamed Wahbi | 900 |
Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2023 Praise Worthy Prize